We got our hands on a database containing more than 8 000 links to the websites in darknet. It is practically one complete register of what is hidden in Tor Hidden Services. We’ve chosen the best!
Injection gloves-off: bypassing antivirus software with Shellter
The great problem for many pentests lies in the fact that any "charged" executable file created with Metasploit or other pentest frameworks can be tracked by any antivirus vendor. That is why a pentester has to find out a way to bypass antivirus software instead of going on with penetration. A lot of time is wasted on this task being performed from case to case. So, eventually, various tools for automation of this task started to appear; today we are going to review one of these cool tools, named Shellter.